
Insert JS or CSS in post via Custom Field Security & Risk Analysis
wordpress.org/plugins/insert-js-or-css-in-post-via-custom-fieldThis plugin will insert urls of JavaScript or CSS stylesheet files added into a particular posts or page via Custom Fields.
Is Insert JS or CSS in post via Custom Field Safe to Use in 2026?
Generally Safe
Score 85/100Insert JS or CSS in post via Custom Field has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "insert-js-or-css-in-post-via-custom-field" plugin, version 0.1, presents a mixed security posture. On the positive side, the static analysis reveals no apparent SQL injection vulnerabilities as all queries use prepared statements. Furthermore, there are no known CVEs associated with this plugin, and the absence of external HTTP requests, file operations, and dangerous function usage suggests a generally cautious approach to development in those areas. The plugin also has a very small attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events. This indicates a limited entry point for potential attackers.
However, a significant concern arises from the output escaping analysis, which indicates that 100% of the single output identified is not properly escaped. This is a critical finding, as it opens the door to Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious JavaScript into the site. Additionally, the lack of nonce checks and capability checks on any potential (though currently unlisted) entry points is a notable weakness, as these are fundamental security mechanisms for verifying user intent and permissions. The absence of taint analysis flows is also noteworthy, suggesting either the analysis tool couldn't find any, or the code's complexity didn't trigger the analysis, which could mask potential issues in more complex scenarios. The plugin's vulnerability history, while clean, is also very limited, which, combined with its low version number, may indicate it has not undergone extensive security scrutiny or real-world attack vectors.
In conclusion, while the plugin exhibits some good security practices by avoiding common pitfalls like raw SQL and a large attack surface, the unescaped output is a critical vulnerability that needs immediate attention. The lack of robust permission and nonce checks on any present entry points is also a significant concern. The plugin's limited history means its long-term security resilience is yet to be proven.
Key Concerns
- Unescaped output
- No nonce checks
- No capability checks
Insert JS or CSS in post via Custom Field Security Vulnerabilities
Insert JS or CSS in post via Custom Field Code Analysis
Output Escaping
Insert JS or CSS in post via Custom Field Attack Surface
WordPress Hooks 1
Maintenance & Trust
Insert JS or CSS in post via Custom Field Maintenance & Trust
Maintenance Signals
Community Trust
Insert JS or CSS in post via Custom Field Alternatives
Insert JavaScript and CSS
insert-javascript-css
Adds fields to the post and page edit pages that allow you to insert custom JavaScript or CSS for that post or page.
Specific CSS/JS for Posts and Pages
specific-cssjs-for-posts-and-pages
With Specific CSS/JS for Posts and Pages you can add CSS or JavaScript files to a specific page or post.
Maui Marketing Scripts, Tags & CSS Manager
maui-marketing-script-manager
This plugin allows you to add custom scripts, css and tags to header, footer and body.
HTML to Post
html-to-post
The HTML, CSS and JS file you choose will be inserted Your post or page.
JS File Selector
js-file-selector
Select Javascript files and/or write Javascript functions to any single page or post
Insert JS or CSS in post via Custom Field Developer Profile
2 plugins · 20 total installs
How We Detect Insert JS or CSS in post via Custom Field
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
<!-- insert JS & CSS by Fedmich --><!-- /insert JS & CSS by Fedmich -->